Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
GitHub
GitHub is a web-based version control and collaboration platform for software developers. Continue Reading
What are hyperautomation use cases for IT operations?
Fully automated NoOps workflows might not be possible, but there's always room to further automate existing processes. An expert explains two hyperautomation use cases for DevOps. Continue Reading
IT incident management
IT incident management is an area of IT service management (ITSM) wherein IT teams return a service to normal as quickly as possible after a disruption with as little negative impact on the business as possible. Continue Reading
-
How and why PowerShell Linux commands differ from Windows
PowerShell is a popular tool for IT professionals and a broad range of tasks. But PowerShell on Linux is not quite the same as on Windows. Let's explore the differences. Continue Reading
Kubernetes pod
Kubernetes pods are the smallest deployable computing units in Kubernetes, an open source system for container scheduling, orchestration and management. Continue Reading
Considerations when getting started with distributed tracing
Distributed tracing has advantages over traditional logging and monitoring, especially for microservices, but it can also affect application performance through added complexity.Continue Reading
mission-critical application
A mission-critical application is a software program or suite of related programs that must function continuously for a business or business segment to be successful.Continue Reading
container repository
A container repository is a collection of related container images that provide different versions of an application.Continue Reading
Google Kubernetes Engine (GKE)
Google Kubernetes Engine (GKE) is a managed Kubernetes service for containers and container clusters running on Google Cloud infrastructure.Continue Reading
3 key steps when creating a DevOps implementation plan
Shifting to the DevOps model can be complicated and challenging. Set your team up for success by learning which areas to prioritize at the early stages of DevOps adoption.Continue Reading
-
container image
A container image is an unchangeable, static file that includes executable code so it can run an isolated process on IT infrastructure.Continue Reading
memory paging
Memory paging is a memory management technique used to control sharing of memory resources belonging to a computer or virtual machine (VM).Continue Reading
Try out PowerShell grep equivalents with these examples
Though less well known than grep, PowerShell cmdlets such as Select-String have extensive search capabilities in their own right. Explore use cases for both in this tutorial.Continue Reading
The evolution of containers: Docker, Kubernetes and the future
Container technology is almost as old as VMs, although IT wasn't talking about the topic until Docker, Kubernetes and other tech made waves that caused a frenzy of activity.Continue Reading
Map physical GPUs to VMs with this GPU passthrough guide
Learn how to set up GPU passthrough -- a useful technique to support graphically intensive apps and machine learning models -- with a step-by-step tutorial for VMware environments.Continue Reading
compliance automation
Compliance automation, also known as automated compliance, is the practice of using technology -- such as applications with artificial intelligence features -- to perform and simplify compliance procedures.Continue Reading
YAML (YAML Ain't Markup Language)
YAML (YAML Ain't Markup Language) is a data serialization language used as the input format for diverse software applications.Continue Reading
Demystify the DevOps process, step by step
While varying definitions and vendor marketing spins can make the meaning of DevOps tough to nail down, there are concrete principles and processes that underpin the methodology.Continue Reading
rolling deployment
A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.Continue Reading
ChatOps
ChatOps, sometimes known as conversation-driven collaboration or conversation-driven DevOps, is the use of chat clients, chatbots and other real-time communication tools to facilitate software development and IT operations tasks.Continue Reading
How to deploy Kubernetes on VMware with vSphere Tanzu
Instead of working with Kubernetes with your regular platform, it might be time to give VMware vSphere with Tanzu a try. Follow this tutorial to get started.Continue Reading
friendly name
A friendly name is a term used to refer to a device, application file, certificate or other IT asset instead of its technical name.Continue Reading
log management
Log management is the collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of large volumes of log data created within an information system.Continue Reading
IT automation
IT automation is the use of instructions to create a repeated process that replaces an IT professional's manual work in data centers and cloud deployments.Continue Reading
Compare Go vs. Python: What are the differences?
Golang and Python are both versatile, popular languages, but they have some important differences that developers should take into account when planning software projects.Continue Reading
hardware emulation
Hardware emulation is the use of one hardware device to mimic the function of another hardware device.Continue Reading
software asset management (SAM)
Software asset management (SAM) is the administration of processes, policies and procedures that support the procurement, deployment, use, maintenance and disposal of software applications within an organization.Continue Reading
golden image
A golden image is a template for a virtual machine, virtual desktop, server or hard disk drive.Continue Reading
event-driven application
An event-driven application is a computer program written to respond to actions generated by a user or system.Continue Reading
guest virtual machine (guest VM)
A guest virtual machine (VM) is the software component of a VM, an independent instance of an operating system (OS), called a guest OS, and its associated software and information.Continue Reading
How to make and use maps in Golang
Maps are a popular data structure in many programming contexts thanks to their efficiency and speed. But, in Go, some unique features make maps especially useful.Continue Reading
Use the CALMS framework for a smooth DevOps transition
Adopting DevOps can be challenging, especially when communicating across IT and business teams. The five elements of the CALMS framework can help organizations measure progress.Continue Reading
DevSecOps
DevSecOps (development plus security plus operations) is an approach that combines application development, security, operations and infrastructure as code (IaC) in an automated continuous integration/continuous delivery (CI/CD) pipeline.Continue Reading
How does Kubernetes use etcd?
Etcd is a lightweight, highly available key-value store accessible to each node in a Kubernetes cluster. Find out how etcd works and learn how to use it inside Kubernetes.Continue Reading
Kubernetes operator
A Kubernetes operator is a method for application packaging and deployment that extends Kubernetes' capabilities to manage more complex, stateful workloads.Continue Reading
composable infrastructure
Composable infrastructure is a framework that decouples device resources in order to treat them as services.Continue Reading
serverless computing
Serverless computing is a cloud computing execution model that lets software developers build and run applications and servers without having to provision or manage the back-end infrastructure.Continue Reading
Dissect open source ransomware code to understand an attack
To protect your organization from ransomware, it's helpful to know what goes on behind the scenes. Unpack this ransomware code example to understand and defend against attacks.Continue Reading
Make a business case for VMware training
You can outsource infrastructure management to a third party or you can get IT admins the VMware training they need to install, manage and troubleshoot your environment.Continue Reading
Manage VMs with Azure Automation State Configuration
Admins can use the Azure Automation State Configuration tool to manage VMs in Azure, on premises and in other clouds. Follow this step-by-step tutorial to get started.Continue Reading
immutable infrastructure
Immutable infrastructure is an approach to managing services and software deployments on IT resources wherein components are replaced rather than changed.Continue Reading
legacy system (legacy application)
A legacy system is any outdated computing system, hardware or software that is still in use. Legacy systems include computer hardware, software applications, file formats and programming languages.Continue Reading
Why and how to use container malware scanning software
Malware is on the rise, and containers are potential attack vectors. Learn why it's crucial to check containers for vulnerabilities and compare container malware scanning tools.Continue Reading
Configure Azure Load Balancer for session persistence
Session persistence ensures users connect to the same server for the duration of their session. Find out how and why to set up session persistence in Azure Load Balancer.Continue Reading
What Golang generics support means for code structure
Generics are a relatively recent addition to the strongly and statically typed Go language. Learn the benefits of using generics in Golang and how to get started.Continue Reading
Learn how to bootstrap Kubernetes clusters with kubeadm
In this guide, learn to create, configure and run a Kubernetes cluster from scratch with kubeadm, a command-line tool that simplifies and automates cluster setup and management.Continue Reading
What is a Raspberry Pi used for?
IT infrastructure can get expensive fast, making single-board computers like the Raspberry Pi appealing for small projects. Learn what a Raspberry Pi does and explore IT use cases.Continue Reading
function as a service (FaaS)
Function as a service (FaaS) is a cloud computing model that enables cloud customers to develop applications and deploy functionalities and only be charged when the functionality executes.Continue Reading
How to integrate and monitor Kubernetes with New Relic
New Relic might be best known as a DevOps monitoring tool, but it can also help improve observability into your Kubernetes clusters. Follow this tutorial to get started.Continue Reading
What IT pros need to know about low-code limitations
Low-code environments promise to simplify and speed up software development, but their limitations can create challenges for enterprise IT. Compare models for low-code adoption.Continue Reading
How to manage stateful containers with Kubernetes
Organizations can reap the benefits of containers for stateful applications by using Kubernetes to maintain state in application processes and components.Continue Reading
Open core vs. open source: What's the difference?
Open core software has gained attention as an alternative to open source and proprietary models. Learn how open core differs from open source and the two approaches' pros and cons.Continue Reading
Explore the pros and cons of Go for DevOps
Author and Docker engineer Teiva Harsanyi explains the benefits of Golang -- including why he sees it as the future of back-end development -- and how to avoid common pitfalls.Continue Reading
Learn to manage Kubernetes costs with this Kubecost tutorial
Managing Kubernetes environments can be complex -- and expensive. Find out how to get started with Kubecost, a tool to monitor costs and capacity in Kubernetes clusters.Continue Reading
How to use Kubernetes' self-healing capability
Self-healing is a quality that enables software to autonomously resolve issues based on a desired state. Kubernetes' self-healing is built in, but it demands observation.Continue Reading
How to bolster vulnerability management with DevSecOps
DevSecOps pushes security work into every stage of the software delivery lifecycle. Vulnerability management is a critical element to this security posture.Continue Reading
How to set up external authentication in Rancher with GitHub
Local authentication is the default, but configuring Rancher to use external authentication services makes it easier to manage large, complex Kubernetes environments.Continue Reading
Build AI into the DevOps maturity model for smooth sailing
AI has promising applications in DevOps, but organizations must account for the maturity of their teams, processes and tools to ensure the success of their AI initiatives.Continue Reading
What is K3OS and how does it relate to K3s?
Discover the potential benefits of adopting K3OS, a lightweight Linux distribution developed to run Kubernetes workloads in low-resource environments.Continue Reading
What IT admins should consider when licensing a VM
Licensing for virtual machines can be particularly tricky to navigate for IT admins, who must ensure proper licensing for hosts -- as well as software running inside VMs.Continue Reading
How to establish a Kubernetes governance strategy
Because Kubernetes is a large, complex tool that touches so much of the IT ecosystem, governance policies are important to meet both internal and external standards.Continue Reading
Step-by-step guide to working with Crossplane and Kubernetes
Crossplane is built to extend Kubernetes resources to and from external sources like databases, the cloud or the edge. Try out the tool, and learn its processes with this tutorial.Continue Reading
real user monitoring (RUM)
Real user monitoring (RUM) is a technology used by developers and network operators to gain real-world observability into web performance and service availability.Continue Reading
An introduction to SRE documentation best practices
SRE documentation stands distinct from other types of IT documentation, not least because it's a core responsibility for site reliability engineers. What else makes it distinct?Continue Reading
root cause analysis
Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.Continue Reading
Is Kubernetes a hypervisor? How do they differ?
Kubernetes, on the surface, appears to perform the same task as a hypervisor. Does that make Kubernetes a hypervisor? The short answer: No. Let's clarify why it's not.Continue Reading
Putting up DevOps guardrails -- what does that mean?
IT projects without proper communication and collaboration can be risky for organizations to take on -- that's where DevOps guardrails come in. Learn more below.Continue Reading
Observability as code is key to the cloud operating model
Why is everything becoming 'as code'? Believe it or not, it's easier to manage and can save the headache of adopting a new, specialized tool. Use the tools you have for OaC.Continue Reading
Follow this tutorial to get started with Azure Bicep
Azure Bicep enables IT ops teams working with IaC to create and deploy Azure resources in a more streamlined manner. Follow this tutorial to learn how.Continue Reading
Use MicroK8s with Raspberry Pi in this tutorial
Kubernetes is important to tackle, but its resource requirements can balloon dramatically. MicroK8s lets individuals experiment with the platform -- try it on Raspberry Pi 4.Continue Reading
Secure your infrastructure against VM ransomware
More hackers are using VMs as an access point to install and deploy encrypted ransomware. Make sure your security strategy includes prevention, response and analysis.Continue Reading
hardware security
Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system.Continue Reading
distributed applications (distributed apps)
Distributed applications (distributed apps) are applications or software that run on multiple computers within a network at the same time and can be stored on servers or cloud computing platforms.Continue Reading
Podman: A worthy alternative to Docker for containers
Podman has long stood in Docker's shadow, but 'Podman in Action' author Daniel Walsh hopes to shine a light on Podman within the container market.Continue Reading
Do hypervisors limit vertical scalability?
Knowing hardware maximums and VM limits ensures you don't overload the system. Learn hypervisor scalability limits for Hyper-V, vSphere, ESXi and Red Hat Virtualization.Continue Reading
An introduction to VMware KVM mode
VM management often requires multiple monitors. KVM mode lets you set hot keys to navigate between VMs and the OS, so no task -- or workflow -- is lost among application windows.Continue Reading
Scrum vs. DevOps: Are they intertwined or redundant?
To keep up with a complex CI/CD environment, IT ops teams can choose between Scrum or DevOps -- or use them together. Discover the roles and benefits of each approach.Continue Reading
An overview of hardware support for virtualization
Intel, AMD and Arm processors optimize virtualization in multiple ways. Read up on the features for Intel VT, AMD-V, Armv9, Intel APICv, and AMD AVIC tech, as well as how they support VMs.Continue Reading
Develop a DevOps branching strategy to promote efficiency
Projects in DevOps environments can move quickly, which often creates chaos. To curb the confusion, use a branching strategy to track changes as teams work simultaneously.Continue Reading
7 principles of observability in modern applications
Organizations must keep these seven principles top of mind when monitoring and organizing data to institute observability practices that resolve problems quickly.Continue Reading
Elastic Stack (ELK Stack)
The Elastic Stack is a group of open source products from Elastic designed to help users take data from any type of source and in any format, and search, analyze and visualize that data in real time.Continue Reading
virtual switch (vSwitch)
A virtual switch (vSwitch) is a software program that enables one virtual machine (VM) to communicate with another.Continue Reading
The 3 pillars of observability: Logs, metrics and traces
Logs, metrics and traces offer their individual perspectives on system performance. When analyzed together, they provide a complete picture of your infrastructure.Continue Reading
Ubuntu snap vs. apt: Which package manager to use and when
Choosing an appropriate package manager depends primarily on your organization's specific IT ecosystem. Determine when snap or apt is the better call.Continue Reading
DevOps goals and objectives for a smooth adoption roadmap
Start your organization's DevOps adoption journey with the right set of metrics -- and drill down from there. And while no two orgs are the same, they share some key goals.Continue Reading
How to set up a K3s cluster
Admins have choices when it comes to selecting a Kubernetes distribution. One such option is K3s, which can be used for development or production. Here's how to get started.Continue Reading
on-demand computing
On-demand computing (ODC) is an enterprise computing delivery model in which computing resources are made available to the user as needed.Continue Reading
How to track -- and measure -- technical debt
Technical debt can grow without an organization's knowledge or control -- unless they address it at the start. Here are different methods and tools to track and manage it.Continue Reading
Whip up recipes with 'Elasticsearch 8.x Cookbook'
Elasticsearch is a powerful and potentially complicated tool. With 'Elasticsearch 8.x Cookbook,' users can split exercises into manageable bites.Continue Reading
How to run Docker on an Azure VM
Microsoft Azure offers a lot of container management services for enterprises to choose from. One of those options is Azure Container Instances. Here's how to get started.Continue Reading
AMD (Advanced Micro Devices)
Advanced Micro Devices (AMD) is a semiconductor company, known for designing and developing computer processors and graphics technologies.Continue Reading
Use Dapr on Kubernetes to build microservices in production
Dapr is an application runtime that targets cloud-native application development. Developers can use it to streamline their workflows. Here's how.Continue Reading
Important DevOps engineer programming languages to learn
We've learned that DevOps demands some code knowledge -- but there are a lot of languages to choose from. Think about CI/CD, object-oriented languages and infrastructure as code.Continue Reading
How to compare Docker images with container-diff
You could pay for a vendor to analyze container images for you, or you could use container-diff for free. Compare container images before deployment to avoid unfortunate mishaps.Continue Reading
How to build a virtual router with VMware Workstation
Virtual networks in testing and development setups require virtual routers. In this step-by-step tutorial, use VMware and Windows tools to set up a virtual router.Continue Reading
Basic virsh network commands to know
It's helpful to know how to use virsh commands to manage VMs and virtual networks; some cloud providers don't support Ansible or VirtualBox. Get started with a few commands.Continue Reading
The future of OpenTelemetry for observability
To collect and analyze telemetry data from cloud-native apps, many organizations use OpenTelemetry for system observability. Discover its benefits and primary components.Continue Reading
How to choose the best CPU for virtualization
Selecting the right CPU for virtual infrastructures depends on many factors, including feature sets and hardware specs. Proper configuration of processor resources is also crucial.Continue Reading
Use Jenkins for deployment, support and provisioning in ops
IT organizations that keep Jenkins on the development side of the house miss out on the orchestrated workflow capabilities it brings to operations tasks.Continue Reading
How to use abstracted repositories in dependency injection
Dependencies in software design can complicate matters. Dependency injection helps simplify it -- but it's not without its faults. Here's what you need to know.Continue Reading